default search action
Ajeet Singh
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j20]Ajeet Singh, Hanz Martin Cheng, Naresh Kumar, Ram Jiwari:
A high order numerical method for analysis and simulation of 2D semilinear Sobolev model on polygonal meshes. Math. Comput. Simul. 227: 241-262 (2025) - 2024
- [j19]Harsimran Singh, Banipreet Kaur, Arun Sharma, Ajeet Singh:
Framework for suggesting corrective actions to help students intended at risk of low performance based on experimental study of college students using explainable machine learning model. Educ. Inf. Technol. 29(7): 7997-8034 (2024) - [j18]Ali Nadim Alhaj, Narottam Das Patel, Ajeet Singh, Rohit Kumar Bondugula, Mohsin Furkh Dar, Jameel Ahamed:
Design and analysis of a robust security layer for software defined network framework. Int. J. Sens. Networks 46(1): 1-14 (2024) - 2023
- [j17]Ajeet Singh, N. D. Patel:
Quantum simulation scenarios and disease classification behaviour on diabetes data. Int. J. Ad Hoc Ubiquitous Comput. 44(2): 109-123 (2023) - [j16]Vikas Tiwari, Ajeet Singh, Appala Naidu Tentu, Ashutosh Saxena:
Generation of 8 × 8 S-boxes using 4 × 4 optimal S-boxes. Int. J. Inf. Comput. Secur. 20(3/4): 399-413 (2023) - [j15]Swapnil Sutar, Vikas Tiwari, Ajeet Singh:
Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT. Int. J. Inf. Comput. Secur. 21(3/4): 336-359 (2023) - 2022
- [j14]Ajeet Singh, Anurag Jain, Seblewongel Esseynew Biable:
Financial Fraud Detection Approach Based on Firefly Optimization Algorithm and Support Vector Machine. Appl. Comput. Intell. Soft Comput. 2022: 1468015:1-1468015:10 (2022) - [j13]Ajeet Singh, Anurag Jain:
An efficient credit card fraud detection approach using cost-sensitive weak learner with imbalanced dataset. Comput. Intell. 38(6): 2035-2055 (2022) - [c7]Raghu Vamshi Hemadri, Amarjot Singh, Ajeet Singh:
ChildrEN SafEty and Rescue (CENSER) System for Trafficked Children from Brothels in India. AAAI 2022: 11917-11925 - [c6]Kushagra Kinger, Ajeet Singh, Sanjaya Kumar Panda:
Priority-Aware Resource Allocation Algorithm for Cloud Computing. IC3 2022: 168-174 - 2021
- [j12]Ajeet Singh, Appala Naidu Tentu, V. Ch. Venkaiah:
A dynamic key management paradigm for secure wireless ad hoc network communications. Int. J. Inf. Comput. Secur. 14(3/4): 380-402 (2021) - [c5]Vikas Tiwari, Allu Swamy Naidu, Ajeet Singh, Ashutosh Saxena:
Construction of $4\times 4$ MDS Matrices for Lightweight Block Ciphers. ANTS 2021: 254-259 - [c4]Ajeet Singh, Vikas Tiwari, Appala Naidu Tentu:
Ceiling Improvement on Breast Cancer Prediction Accuracy Using Unary KNN and Binary LightGBM Stacked Ensemble Learning. ICMC 2021: 451-471 - 2020
- [j11]Rakesh Kumar, Allu Swamy Naidu, Ajeet Singh, Appala Naidu Tentu:
McEliece cryptosystem: simulation and security vulnerabilities. Int. J. Comput. Sci. Math. 12(1): 64-81 (2020)
2010 – 2019
- 2019
- [j10]Ajeet Singh, Shafaque Zahra, Durdam Das, Shailesh Kumar:
AtFusionDB: a database of fusion transcripts in Arabidopsis thaliana. Database J. Biol. Databases Curation 2019: bay135 (2019) - [j9]Ajeet Singh, Anurag Jain:
An Empirical Study of AML Approach for Credit Card Fraud Detection-Financial Transactions. Int. J. Comput. Commun. Control 14(6): 670-690 (2019) - [j8]Vikas Tiwari, Ajeet Singh, Appala Naidu Tentu:
Differential cryptanalysis on DES cryptosystem up to eight rounds. Int. J. Inf. Priv. Secur. Integr. 4(1): 1-29 (2019) - [j7]Ajeet Singh, Vikas Tiwari:
An optimal dimension reduction-based feature selection and classification strategy for geospatial imagery. Int. J. Knowl. Eng. Soft Data Paradigms 6(2): 120-138 (2019) - 2018
- [j6]Nikita Gupta, Ajeet Singh, Shafaque Zahra, Shailesh Kumar:
PtRFdb: a database for plant transfer RNA-derived fragments. Database J. Biol. Databases Curation 2018: bay063 (2018) - [j5]Nikita Gupta, Shafaque Zahra, Ajeet Singh, Shailesh Kumar:
PVsiRNAdb: a database for plant exclusive virus-derived small interfering RNAs. Database J. Biol. Databases Curation 2018: bay105 (2018) - [j4]Devender Arora, Ajeet Singh:
Systems biology approach deciphering the biochemical signaling pathway and pharmacokinetic study of PI3K/mTOR/p53-Mdm2 module involved in neoplastic transformation. Netw. Model. Anal. Health Informatics Bioinform. 7(1): 2 (2018) - [c3]Priya Vinayak, Ajeet Singh, Sameer Sapra, Madhusudan Singh, Bhaskar Mitra:
A Solution Processed CdSe N Ano-Platelets Based Sensor for Cd Detection. IEEE SENSORS 2018: 1-4 - [c2]Ajeet Singh, Vikas Tiwari, Appala Naidu Tentu:
A Machine Vision Attack Model on Image Based CAPTCHAs Challenge: Large Scale Evaluation. SPACE 2018: 52-64 - 2017
- [j3]Devender Arora, Kumari Jyoti, Ajeet Singh:
Understanding the role of Salmonella pathogenic island 1 (SPI-I) and host-pathogen interaction for typhoid using system biology approach. Int. J. Bioinform. Res. Appl. 13(3): 187-199 (2017) - 2014
- [j2]Jaspreet Kaur Dhanjal, Sonam Grover, Sudhanshu Sharma, Ajeet Singh, Abhinav Grover:
Structural insights into mode of actions of novel natural Mycobacterium protein tyrosine phosphatase B inhibitors. BMC Genom. 15(S-1): S3 (2014)
2000 – 2009
- 2009
- [c1]Ajeet Singh, Pavan Balaji, Wu-chun Feng:
GePSeA: A General-Purpose Software Acceleration Framework for Lightweight Task Offloading. ICPP 2009: 261-268 - 2003
- [j1]Giancarlo Marullo-Reedtz, Roberto Cerri, Isabelle Blanc, Ove Gunnarsson, Jonathan M. Williams, Felix Raso, Kyu-Tae Kim, Robert B. Frenkel, Zhang Xiuzeng, Alexander S. Katkov, Ronald Dziuba, Mark Parker, Barry M. Wood, Laurie A. Christian, Eddie Tarnow, Surender K. Mahajan, Ajeet Singh, Yasuhiko Sakamoto:
Comparison CCEM-K8 of DC voltage ratio: results. IEEE Trans. Instrum. Meas. 52(2): 419-423 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint